Static task
static1
Behavioral task
behavioral1
Sample
2ec4cf551a2962a9601770b198a166fe_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2ec4cf551a2962a9601770b198a166fe_JaffaCakes118.exe
Resource
win10v2004-20240708-en
General
-
Target
2ec4cf551a2962a9601770b198a166fe_JaffaCakes118
-
Size
332KB
-
MD5
2ec4cf551a2962a9601770b198a166fe
-
SHA1
af7fa282d1f68f60239760ad5dee4d78809e4554
-
SHA256
ad3879f7fb2fe89e0fb6cd92f64a559577b2fdbb8e3812f962b7adb6ccd0ead2
-
SHA512
6c00f1af266551674282bb7851ab87c167d43a7bb17de9b7baee9243230e646e9cea7a1116c644b261ba1d7d3e6a58748c3d2751a41ef73e0b9280d8238ffa8f
-
SSDEEP
6144:74+pXL8GJHX/nSAS/RcMdnN885mlsu/C2uz:7ZXLB1qcMEGdz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ec4cf551a2962a9601770b198a166fe_JaffaCakes118
Files
-
2ec4cf551a2962a9601770b198a166fe_JaffaCakes118.exe windows:4 windows x86 arch:x86
1b398deefe814f3e0566cec72823fea0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
LocalLock
UnhandledExceptionFilter
GlobalGetAtomNameW
LeaveCriticalSection
CloseHandle
GetEnvironmentVariableW
lstrcpyA
GlobalAddAtomA
ExitProcess
SetNamedPipeHandleState
LocalSize
CreateWaitableTimerA
FindCloseChangeNotification
FindNextChangeNotification
GetLocaleInfoW
FindFirstFileExW
GetCommandLineA
GetVersionExA
user32
LoadImageW
wvsprintfA
DrawEdge
GetTopWindow
SetMenuDefaultItem
TileWindows
GetWindowTextLengthW
DestroyIcon
LoadIconW
GetClassInfoW
MessageBoxIndirectW
GetMessageW
LoadBitmapA
RegisterClipboardFormatW
GetWindowTextA
UnhookWindowsHookEx
IsCharAlphaNumericW
OemToCharBuffW
IsWindowEnabled
EnumDesktopWindows
GetSysColorBrush
GetScrollBarInfo
PostThreadMessageW
IsCharAlphaNumericA
DialogBoxParamA
IsDialogMessageW
SendInput
ShowScrollBar
SetPropA
InSendMessage
keybd_event
ExitWindowsEx
WaitForInputIdle
SystemParametersInfoA
MessageBoxW
SetWindowContextHelpId
MonitorFromPoint
GetWindow
LoadAcceleratorsW
DrawMenuBar
LoadMenuW
GetMenuItemInfoW
CharToOemA
GetShellWindow
EnumDisplayDevicesA
GetWindowDC
gdi32
SetTextColor
GetDIBits
RestoreDC
WidenPath
FillPath
GetTextCharacterExtra
SetSystemPaletteUse
PtVisible
GetCharWidthW
GetSystemPaletteUse
GdiFlush
Escape
EqualRgn
ExtTextOutA
SelectClipPath
ExtEscape
DPtoLP
GetGlyphOutlineW
SetLayout
SetColorAdjustment
comdlg32
ReplaceTextA
ChooseFontA
GetFileTitleA
advapi32
RegisterServiceCtrlHandlerW
RegReplaceKeyW
RegEnumValueA
RegQueryInfoKeyA
GetFileSecurityA
OpenProcessToken
EnumServicesStatusW
StartServiceCtrlDispatcherA
AbortSystemShutdownW
LookupPrivilegeValueW
RegQueryValueW
ImpersonateSelf
AddAce
LockServiceDatabase
SetNamedSecurityInfoA
RegCreateKeyExW
AdjustTokenPrivileges
SetServiceObjectSecurity
CryptGetUserKey
CryptReleaseContext
RegQueryValueExA
SetSecurityDescriptorDacl
CryptDeriveKey
SetSecurityDescriptorSacl
EnumDependentServicesA
BuildTrusteeWithSidW
CryptAcquireContextW
AccessCheck
GetUserNameA
CryptSetHashParam
CryptSetProvParam
shell32
SHAddToRecentDocs
SHFileOperationW
SHGetDesktopFolder
DragFinish
SHBrowseForFolderA
ole32
OleFlushClipboard
oleaut32
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
comctl32
ImageList_SetBkColor
ImageList_GetIcon
ImageList_EndDrag
shlwapi
StrChrIA
PathIsSameRootW
setupapi
SetupDiSetClassInstallParamsA
SetupDiOpenDeviceInfoW
SetupDiGetDeviceInstallParamsA
SetupDiBuildDriverInfoList
SetupPromptReboot
SetupDiEnumDriverInfoA
SetupGetStringFieldW
SetupDiEnumDeviceInterfaces
SetupDiGetClassDescriptionW
SetupDiDestroyDriverInfoList
SetupDiDestroyDeviceInfoList
Sections
.text Size: 300KB - Virtual size: 297KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE